default search action
12. Information Hiding 2010: Calgary, AB, Canada
- Rainer Böhme, Philip W. L. Fong, Reihaneh Safavi-Naini:
Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer 2010, ISBN 978-3-642-16434-7 - Mehrdad Majzoobi, Ahmed Elnably, Farinaz Koushanfar:
FPGA Time-Bounded Unclonable Authentication. 1-16 - Farinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani:
A Unified Submodular Framework for Multimodal IC Trojan Detection. 17-32 - Sudeep Ghosh, Jason Hiser, Jack W. Davidson:
A Secure and Robust Approach to Software Tamper Resistance. 33-47 - Boris Skoric:
Security with Noisy Data - (Extended Abstract of Invited Talk). 48-50 - Seung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee:
Detection of Copy-Rotate-Move Forgery Using Zernike Moments. 51-65 - Christian Riess, Elli Angelopoulou:
Scene Illumination as an Indicator of Image Manipulation. 66-80 - Gábor Tardos:
Capacity of Collusion Secure Fingerprinting - A Tradeoff between Rate and Efficiency - (Extended Abstract of Invited Talk). 81-85 - Koji Nuida:
Short Collusion-Secure Fingerprint Codes against Three Pirates. 86-102 - Minoru Kuribayashi:
Tardos's Fingerprinting Code over AWGN Channel. 103-117 - Jennifer L. Davidson, Jaikishan Jalan:
Steganalysis Using Partially Ordered Markov Models. 118-132 - Valentin Schwamberger, Pham Hai Dang Le, Bernhard Schölkopf, Matthias O. Franz:
The Influence of the Image Basis on Modeling and Steganalysis Performance. 133-144 - Andrew D. Ker:
The Square Root Law in Stegosystems with Imperfect Information. 145-160 - Tomás Pevný, Tomás Filler, Patrick Bas:
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. 161-177 - Anindya Sarkar, Kaushal Solanki, B. S. Manjunath:
Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. 178-192 - Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser:
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. 193-207 - Peng Meng, Liusheng Huang, Zhili Chen, Yuchong Hu, Wei Yang:
STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography. 208-220 - Nayantara Mallesh, Matthew K. Wright:
The Reverse Statistical Disclosure Attack. 221-234 - Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang:
Security Analysis of ISS Watermarking Using Natural Scene Statistics. 235-248 - Jian Cao, Jiwu Huang:
Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework. 249-261 - Jian Cao, Jiwu Huang, Jiangqun Ni:
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness. 262-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.